2005
DOI: 10.1109/tdsc.2005.35
|View full text |Cite
|
Sign up to set email alerts
|

D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
126
0
3

Year Published

2011
2011
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 196 publications
(130 citation statements)
references
References 10 publications
1
126
0
3
Order By: Relevance
“…This is necessary in order to obfuscate certain pieces of personal information contained in log files and preserve the privacy of the end-users. 35 Until now, various research works [22,23,24,25,26] have been dedicated to the identification of resource consumption attacks as a part of network Intrusion Detection Systems (IDS). However, as already pointed out, mainly for privacy reasons very few concentrate on the analysis of VoIP audit trails to identify and distinguish uncommon or suspicious traffic.…”
Section: R a F Tmentioning
confidence: 99%
See 1 more Smart Citation
“…This is necessary in order to obfuscate certain pieces of personal information contained in log files and preserve the privacy of the end-users. 35 Until now, various research works [22,23,24,25,26] have been dedicated to the identification of resource consumption attacks as a part of network Intrusion Detection Systems (IDS). However, as already pointed out, mainly for privacy reasons very few concentrate on the analysis of VoIP audit trails to identify and distinguish uncommon or suspicious traffic.…”
Section: R a F Tmentioning
confidence: 99%
“…This fact alone makes the processing and exchange of audit trails among multimedia providers highly troublesome and problematic. This is because 25 …”
mentioning
confidence: 99%
“…The more number attacking agents makes that when compared to DoS attack there is less probability for the zombies to get detected by victim. There are a number of mechanisms to carry out DDoS attack, such as TCP SYN flooding [3], UDP flooding attack [4], Ping of death [1] and DNS attack [5]. In this paper we will concentrate only on SYN flooding attack.…”
Section: B Ddos Attackmentioning
confidence: 99%
“…It uses the flaws in the TCP 3-way handshake mechanism [5]. The TCP 3-way handshake mechanism is shown in Fig.…”
Section: Syn Flooding Attackmentioning
confidence: 99%
See 1 more Smart Citation